Sandbox Quiz Answer NSE 2

Sandbox Quiz Answer NSE 2

Sandbox Quiz Answer NSE 2
Fig 1: Sandbox Quiz Answer NSE 2
 

Question 1: Which two problems was network security experiencing before the introduction of a sandbox solution? (Choose two.)

·         Network security was unable to handle a coordinated attack using different threat vectors and methods.

·         AVs were not introduced into network security.

·         Security devices did not communicate with other security devices on the network.

·         Firewalls were non-existent.

Question 2: For which two reasons was the sandbox solution added to network security? (Choose two.)

·         Firewalls were quite sufficient but better risk management was needed.

·         Firewalls and AVs were helpless against unknown threats.

·         Unknown threats needed to be quarantined.

·         AVs were able to stop unknown threats, but firewalls could not.

Question 3: How does sandbox solve the problem of aggregating threat intelligence data?

·         By sharing malicious code with all devices on the network

·         By sharing valuable threat intelligence to the security devices on its network

·         By alerting administrators to threats

·         By executing malicious code in multiple isolated environments

Question 4: What are two characteristics of a sandbox? (Choose two.)

·         A sandbox only provides completely independent protection of IOT devices.

·         If something unexpected or malicious happens, it affects only the sandbox.

·         A sandbox provides full network security.

·         A sandbox confines the actions of code to the sandbox device and in isolation to the rest of the network.

Question 5: Which two business problems is FortiSandbox trying to solve? (Choose two.)

·         Nonexistent or inadequate firewall protection

·         Insufficient fine-tuning of network performance

·         The choice of performance over security by businesses

·         The potential to exploit OS or application weaknesses with malignant code

Question 6: What is the purpose of the sandbox?

·         To stop all BYOD network traffic

·         To flag and pass the known exploit to the endpoint to handle

·         To observe the activity of unknown code in a quarantined environment

·         To run vulnerability scans on all network endpoints

Question 7: What is a zero-day attack?

·         Exploiting a vulnerability scanner

·         Vulnerability scanning from the zero-day

·         Exploiting only zero-day configured firewalls.

·         Exploiting an unknown deficiency in code.

Question 8: Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning?
Select one:

·         AI-driven attacks*

·         Trojan horse

·         Ransomware

·         Polymorphic viruses

Question 9: Which feature in early networks made aggregating threat intelligence difficult?
Select one:

·         Hybrid cloud environments

·         Virtualization

·         Segmentation

·         Point solutions

Question 10: Which failing characterized early sandbox technology?
Select one:

·         Could not stop zero-day attacks/

·         Failed to categorize malware/

·         Lack of integration with other security devices

·         Slowed network traffic

Question 11: Within the computer security context, what is a sandbox?
Select one:

·         An isolated virtual environment to test suspicious files and hyperlinks*

·         A process used to identify, describe, and categorize malware

·         A service in the Cloud used to collect and share threat intelligence

·         A segment of the network reserved for testing unknown programs

Question 12: Which feature characterizes third-generation sandbox technology?
Select one:

·         Scanning of encrypted data streams

·         Streamlines manual testing

·         Automation and artificial intelligence

·         Faster network speeds

Question 13: What was a benefit of second generation sandbox technology?
Select one:

·         Scanning of encrypted data streams

·         Automation and artificial intelligence (AI)

·         Faster network speeds

·         Timely sharing of threat intelligence

 

Post a Comment

0 Comments